WO2007008808A3 - Maintaining security for file copy operations - Google Patents
Maintaining security for file copy operations Download PDFInfo
- Publication number
- WO2007008808A3 WO2007008808A3 PCT/US2006/026744 US2006026744W WO2007008808A3 WO 2007008808 A3 WO2007008808 A3 WO 2007008808A3 US 2006026744 W US2006026744 W US 2006026744W WO 2007008808 A3 WO2007008808 A3 WO 2007008808A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- metadata
- encrypted
- request
- computer files
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Abstract
Securing computer files in which a publish permission is present in a file system. Upon receiving a request to write data from one file to another, the file system determines whether publish permission is needed. If so and the user lacks the publish permission, the request is rejected. Disclosed is securing computer files which include encrypting metadata about an encrypted file and storing both the encrypted file and the encrypted metadata. The metadata includes a key for decrypting the encrypted file. The key for decrypting the metadata is stored in a USB security token. Disclosed is securing computer files which include copying material from a window displaying the contents of a file to a clipboard application. The file or window is associated with the material. The clipboard application can deny a request to paste material associated with one file to a window displaying the contents of a different file.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US69816105P | 2005-07-11 | 2005-07-11 | |
US60/698,161 | 2005-07-11 | ||
US11/228,151 US20070016771A1 (en) | 2005-07-11 | 2005-09-16 | Maintaining security for file copy operations |
US11/228,151 | 2005-09-16 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007008808A2 WO2007008808A2 (en) | 2007-01-18 |
WO2007008808A3 true WO2007008808A3 (en) | 2008-02-14 |
Family
ID=37637832
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/026744 WO2007008808A2 (en) | 2005-07-11 | 2006-07-10 | Maintaining security for file copy operations |
Country Status (2)
Country | Link |
---|---|
US (1) | US20070016771A1 (en) |
WO (1) | WO2007008808A2 (en) |
Families Citing this family (70)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7584208B2 (en) | 2002-11-20 | 2009-09-01 | Radar Networks, Inc. | Methods and systems for managing offers and requests in a network |
US7640267B2 (en) | 2002-11-20 | 2009-12-29 | Radar Networks, Inc. | Methods and systems for managing entities in a computing device using semantic objects |
US7433876B2 (en) | 2004-02-23 | 2008-10-07 | Radar Networks, Inc. | Semantic web portal and platform |
US8656461B2 (en) * | 2006-07-28 | 2014-02-18 | Microsoft Corporation | Copy-paste trust system |
US8924838B2 (en) * | 2006-08-09 | 2014-12-30 | Vcvc Iii Llc. | Harvesting data from page |
US20080288782A1 (en) * | 2007-05-18 | 2008-11-20 | Technology Properties Limited | Method and Apparatus of Providing Security to an External Attachment Device |
US20080181406A1 (en) * | 2007-01-30 | 2008-07-31 | Technology Properties Limited | System and Method of Storage Device Data Encryption and Data Access Via a Hardware Key |
JP4087434B1 (en) * | 2007-07-23 | 2008-05-21 | Sky株式会社 | Data security control system |
US20090076887A1 (en) * | 2007-09-16 | 2009-03-19 | Nova Spivack | System And Method Of Collecting Market-Related Data Via A Web-Based Networking Environment |
US20090106307A1 (en) * | 2007-10-18 | 2009-04-23 | Nova Spivack | System of a knowledge management and networking environment and method for providing advanced functions therefor |
US7818458B2 (en) * | 2007-12-03 | 2010-10-19 | Microsoft Corporation | Clipboard for application sharing |
US7912986B2 (en) * | 2008-02-25 | 2011-03-22 | Simdesk Technologies | Secure block read and write protocol for remotely stored files |
US8515996B2 (en) | 2008-05-19 | 2013-08-20 | Emulex Design & Manufacturing Corporation | Secure configuration of authentication servers |
US20100004975A1 (en) * | 2008-07-03 | 2010-01-07 | Scott White | System and method for leveraging proximity data in a web-based socially-enabled knowledge networking environment |
KR100928467B1 (en) * | 2009-02-02 | 2009-11-25 | 주식회사 파수닷컴 | Clipboard security system and method thereof |
US20100262836A1 (en) * | 2009-04-13 | 2010-10-14 | Eric Peukert | Privacy and confidentiality preserving mapping repository for mapping reuse |
WO2010120925A2 (en) * | 2009-04-15 | 2010-10-21 | Evri Inc. | Search and search optimization using a pattern of a location identifier |
US9037567B2 (en) * | 2009-04-15 | 2015-05-19 | Vcvc Iii Llc | Generating user-customized search results and building a semantics-enhanced search engine |
US8200617B2 (en) | 2009-04-15 | 2012-06-12 | Evri, Inc. | Automatic mapping of a location identifier pattern of an object to a semantic type using object metadata |
US10628847B2 (en) * | 2009-04-15 | 2020-04-21 | Fiver Llc | Search-enhanced semantic advertising |
US9355282B2 (en) * | 2010-03-24 | 2016-05-31 | Red Hat, Inc. | Using multiple display servers to protect data |
KR101064143B1 (en) * | 2010-08-20 | 2011-09-15 | 주식회사 파수닷컴 | System for protecting data stored in clipboard in digital rights management environment and recording medium storing program for executing method of the same in computer |
US9141808B1 (en) * | 2010-10-29 | 2015-09-22 | Symantec Corporation | Data loss prevention |
US8627104B2 (en) | 2011-04-28 | 2014-01-07 | Absio Corporation | Secure data storage |
EP2756323A1 (en) * | 2011-09-13 | 2014-07-23 | Acuitas Medical Limited | Magnetic resonance based method for assessing alzheimer's disease and related pathologies |
US20140032733A1 (en) | 2011-10-11 | 2014-01-30 | Citrix Systems, Inc. | Policy-Based Application Management |
US9043480B2 (en) | 2011-10-11 | 2015-05-26 | Citrix Systems, Inc. | Policy-based application management |
US9280377B2 (en) | 2013-03-29 | 2016-03-08 | Citrix Systems, Inc. | Application with multiple operation modes |
US9215225B2 (en) | 2013-03-29 | 2015-12-15 | Citrix Systems, Inc. | Mobile device locking with context |
US8869235B2 (en) | 2011-10-11 | 2014-10-21 | Citrix Systems, Inc. | Secure mobile browser for protecting enterprise data |
KR101887426B1 (en) * | 2012-03-16 | 2018-08-10 | 삼성전자주식회사 | Apparatus and method for ensuring privacy in contents sharing system |
US8625805B1 (en) | 2012-07-16 | 2014-01-07 | Wickr Inc. | Digital security bubble |
US9774658B2 (en) | 2012-10-12 | 2017-09-26 | Citrix Systems, Inc. | Orchestration framework for connected devices |
US8726343B1 (en) | 2012-10-12 | 2014-05-13 | Citrix Systems, Inc. | Managing dynamic policies and settings in an orchestration framework for connected devices |
US9516022B2 (en) | 2012-10-14 | 2016-12-06 | Getgo, Inc. | Automated meeting room |
US8910239B2 (en) | 2012-10-15 | 2014-12-09 | Citrix Systems, Inc. | Providing virtualized private network tunnels |
US20140109176A1 (en) | 2012-10-15 | 2014-04-17 | Citrix Systems, Inc. | Configuring and providing profiles that manage execution of mobile applications |
US9606774B2 (en) | 2012-10-16 | 2017-03-28 | Citrix Systems, Inc. | Wrapping an application with field-programmable business logic |
US20140108793A1 (en) | 2012-10-16 | 2014-04-17 | Citrix Systems, Inc. | Controlling mobile device access to secure data |
US20140109072A1 (en) | 2012-10-16 | 2014-04-17 | Citrix Systems, Inc. | Application wrapping for application management framework |
US9971585B2 (en) | 2012-10-16 | 2018-05-15 | Citrix Systems, Inc. | Wrapping unmanaged applications on a mobile device |
US8972750B2 (en) * | 2012-12-19 | 2015-03-03 | Adobe Systems Incorporated | Method and apparatus for securing transfer of secure content to a destination |
US10348821B2 (en) * | 2012-12-21 | 2019-07-09 | Dropbox, Inc. | Prioritizing structural operations and distributing changes in a synced online content management system |
WO2014110057A1 (en) * | 2013-01-08 | 2014-07-17 | Good Technology Corporation | Clipboard management |
US9985850B2 (en) | 2013-03-29 | 2018-05-29 | Citrix Systems, Inc. | Providing mobile device management functionalities |
US9355223B2 (en) | 2013-03-29 | 2016-05-31 | Citrix Systems, Inc. | Providing a managed browser |
US9413736B2 (en) | 2013-03-29 | 2016-08-09 | Citrix Systems, Inc. | Providing an enterprise application store |
US8850049B1 (en) | 2013-03-29 | 2014-09-30 | Citrix Systems, Inc. | Providing mobile device management functionalities for a managed browser |
US10284627B2 (en) | 2013-03-29 | 2019-05-07 | Citrix Systems, Inc. | Data management for an application with multiple operation modes |
US9830089B1 (en) | 2013-06-25 | 2017-11-28 | Wickr Inc. | Digital data sanitization |
US9866591B1 (en) | 2013-06-25 | 2018-01-09 | Wickr Inc. | Enterprise messaging platform |
US10567349B2 (en) | 2013-06-25 | 2020-02-18 | Wickr Inc. | Secure time-to-live |
US10129260B1 (en) | 2013-06-25 | 2018-11-13 | Wickr Inc. | Mutual privacy management |
US9698976B1 (en) | 2014-02-24 | 2017-07-04 | Wickr Inc. | Key management and dynamic perfect forward secrecy |
US10298555B2 (en) * | 2014-04-04 | 2019-05-21 | Zettaset, Inc. | Securing files under the semi-trusted user threat model using per-file key encryption |
US10873454B2 (en) | 2014-04-04 | 2020-12-22 | Zettaset, Inc. | Cloud storage encryption with variable block sizes |
US10043029B2 (en) | 2014-04-04 | 2018-08-07 | Zettaset, Inc. | Cloud storage encryption |
US9584530B1 (en) | 2014-06-27 | 2017-02-28 | Wickr Inc. | In-band identity verification and man-in-the-middle defense |
US9654288B1 (en) | 2014-12-11 | 2017-05-16 | Wickr Inc. | Securing group communications |
US9584493B1 (en) | 2015-12-18 | 2017-02-28 | Wickr Inc. | Decentralized authoritative messaging |
US10291607B1 (en) | 2016-02-02 | 2019-05-14 | Wickr Inc. | Providing real-time events to applications |
US10015230B1 (en) | 2016-02-09 | 2018-07-03 | Robert Buergi | Copying and pasting among networked devices |
CN107220555B (en) * | 2016-03-22 | 2022-04-19 | 中兴通讯股份有限公司 | Clipboard access control method and system |
US9596079B1 (en) | 2016-04-14 | 2017-03-14 | Wickr Inc. | Secure telecommunications |
US9590958B1 (en) | 2016-04-14 | 2017-03-07 | Wickr Inc. | Secure file transfer |
US10541999B1 (en) * | 2017-05-19 | 2020-01-21 | Knowledge Initiatives LLC | Multi-person authentication and validation controls for image sharing |
US10803093B2 (en) | 2017-09-22 | 2020-10-13 | Microsoft Technology Licensing, Llc | Systems and methods for enabling a file management label to persist on a data file |
US10866963B2 (en) | 2017-12-28 | 2020-12-15 | Dropbox, Inc. | File system authentication |
US20190227857A1 (en) * | 2018-01-25 | 2019-07-25 | salesforce com, inc | Smart clipboard for secure data transfer |
IL293198A (en) * | 2019-05-22 | 2022-07-01 | Myota Inc | Method and system for distributed data storage with enhanced security, resilience, and control |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040054674A1 (en) * | 2002-09-13 | 2004-03-18 | Carpenter Keith A. | Enabling a web application to access a protected file on a secured server |
US20050039001A1 (en) * | 2003-07-30 | 2005-02-17 | Microsoft Corporation | Zoned based security administration for data items |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001025928A1 (en) * | 1999-10-01 | 2001-04-12 | Infraworks Corporation | Method and apparatus for monitoring clock-related permission on a computer to prevent unauthorized access |
US6553466B1 (en) * | 1999-10-01 | 2003-04-22 | Infraworks Corporation | Shared memory blocking method and system |
US20070006321A1 (en) * | 2005-07-01 | 2007-01-04 | International Business Machines Corporation | Methods and apparatus for implementing context-dependent file security |
-
2005
- 2005-09-16 US US11/228,151 patent/US20070016771A1/en not_active Abandoned
-
2006
- 2006-07-10 WO PCT/US2006/026744 patent/WO2007008808A2/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040054674A1 (en) * | 2002-09-13 | 2004-03-18 | Carpenter Keith A. | Enabling a web application to access a protected file on a secured server |
US20050039001A1 (en) * | 2003-07-30 | 2005-02-17 | Microsoft Corporation | Zoned based security administration for data items |
Also Published As
Publication number | Publication date |
---|---|
US20070016771A1 (en) | 2007-01-18 |
WO2007008808A2 (en) | 2007-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007008808A3 (en) | Maintaining security for file copy operations | |
WO2007008806A3 (en) | Secure clipboard function | |
WO2007008807A3 (en) | Secure local storage of files | |
US8352735B2 (en) | Method and system for encrypted file access | |
US20200028827A1 (en) | Method and system for digital rights management of documents | |
WO2008063384A3 (en) | Systems and methods for document control using public key encryption | |
US7516327B2 (en) | Distributing access to a data item | |
WO2008019176A3 (en) | System and method for biometrically secured, transparent encryption and decryption | |
US10742633B2 (en) | Method and system for securing data | |
EP1596269A2 (en) | A system and method for rendering selective presentation of documents | |
KR100945476B1 (en) | Apparatus and method for digital rights management using virtualization technique | |
TW200636554A (en) | Memory ststem with versatile content control | |
MXPA05008286A (en) | Distribution and rights management of digital content. | |
US9444628B2 (en) | Providing differential access to a digital document | |
DE60016972D1 (en) | ADAPTABLE SAFETY MECHANISM TO PREVENT UNLAWFUL ACCESS TO DIGITAL DATA | |
JP2006155155A (en) | Information leakage preventing device and method, and its program | |
US20090222500A1 (en) | Information storage device and method capable of hiding confidential files | |
JP2006244486A (en) | Method for forming right of use for item on bases of access right and computer readable medium | |
KR101468258B1 (en) | Portable data storage device for protecting illegal replica | |
US8972747B2 (en) | Managing information in a document serialization | |
JP2008234544A (en) | File encrypting/decrypting system, file encrypting/decrypting method and file encrypting/decrypting program | |
JP2008527518A (en) | Portable data carrier with digital watermark function | |
US10216745B2 (en) | Control method of recoverable file protection device and protection method of recoverable file | |
ATE328316T1 (en) | METHOD AND DEVICE FOR MAINTAINING SECURE DATA INPUT AND DATA OUTPUT | |
US9152636B2 (en) | Content protection system in storage media and method of the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSANT TO RULE 112(1) EPC DATED 28.04.2008 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06786784 Country of ref document: EP Kind code of ref document: A2 |